a870a15461
- Introduce virtlockd daemon - parallels: add disk and network device support - Add virDomainSendProcessSignal API - Introduce virDomainFSTrim() public API - add fuse support for libvirt lxc - Add Gluster protocol as supported network disk backend - various snapshot improvements - Add upstream patches to fix bugs in 1.0.1 66ff2ddc-virtlockd-systemd-file-perms.patch, 462a6962-script-fixes1.patch, cb854b8f-script-fixes2.patch, 5ec4b22b-script-fixes3.patch, a1fd56cb-script-fixes4.patch, 68e7bc45-libxl-link-fix.patch - Rework SUSE patches for the various init scripts Dropped use-init-script-redhat.patch and added libvirtd-init-script.patch, libvirt-guests-init-script.patch, and virtlockd-init-script.patch - Drop upstream patches: 371ddc98-xen-sysctl-9.patch, 416eca18-xenstore-header-fix.patch, f644361b-virCommand-env.patch, 2b32735a-virCommand-env.patch, 9785f2b6-fix-xen-sysctl9.patch OBS-URL: https://build.opensuse.org/package/show/Virtualization/libvirt?expand=0&rev=238
32 lines
1.2 KiB
Diff
32 lines
1.2 KiB
Diff
Allow qemu driver (and hence libvirtd) to load when qemu
|
|
user:group does not exist. The kvm package, which may not
|
|
exist on a xen host, creates qemu user:group.
|
|
|
|
A better (future) solution would be to build the libvirtd
|
|
drivers as loadable modules instead of built-in to the
|
|
daemon. Then the qemu driver would only be loaded when needed,
|
|
which would never be the case on a xen-only configuration.
|
|
|
|
Index: libvirt-1.0.1/src/qemu/qemu_conf.c
|
|
===================================================================
|
|
--- libvirt-1.0.1.orig/src/qemu/qemu_conf.c
|
|
+++ libvirt-1.0.1/src/qemu/qemu_conf.c
|
|
@@ -252,7 +252,7 @@ int qemuLoadDriverConfig(virQEMUDriverPt
|
|
goto no_memory;
|
|
|
|
if (virGetUserID(user, &driver->user) < 0)
|
|
- goto cleanup;
|
|
+ VIR_WARN("User %s does not exist! Continuing...", user);
|
|
|
|
p = virConfGetValue(conf, "group");
|
|
CHECK_TYPE("group", VIR_CONF_STRING);
|
|
@@ -260,7 +260,7 @@ int qemuLoadDriverConfig(virQEMUDriverPt
|
|
goto no_memory;
|
|
|
|
if (virGetGroupID(group, &driver->group) < 0)
|
|
- goto cleanup;
|
|
+ VIR_WARN("Group %s does not exist! Continuing...", group);
|
|
|
|
GET_VALUE_LONG("dynamic_ownership", driver->dynamicOwnership);
|
|
|